Digital Library
Search: "[ keyword: Intrusion Detection System ]" (10)
Machine Learning Based Intrusion Detection Systems for Class Imbalanced Datasets
Yun-Gyung Cheong,
Kinam Park,
Hyunjoo Kim,
Jonghyun Kim,
Sangwon Hyun,
Vol. 27, No. 6, pp. 1385-1395,
Dec.
2017
10.13089/JKIISC.2017.27.6.
Keywords: Intrusion Detection System, Machine Learning, Imbalanced Dataset
10.13089/JKIISC.2017.27.6.
Keywords: Intrusion Detection System, Machine Learning, Imbalanced Dataset
Malicious Code Detection using the Effective Preprocessing Method Based on Native API
Seong-Jae Bae,
Jae-Ik Cho,
Tae-Shik Shon,
Jong-Sub Moon,
Vol. 22, No. 4, pp. 785-796,
Aug.
2012
10.13089/JKIISC.2012.22.4.785
Keywords: Malicious Code, Intrusion Detection System, GLDA
10.13089/JKIISC.2012.22.4.785
Keywords: Malicious Code, Intrusion Detection System, GLDA
A New Method to Detect Anomalous State of Network using Information of Clusters
Ho-Sub Lee,
Eung-Ki Park,
Jung-Taek Seo,
Vol. 22, No. 3, pp. 545-552,
Jun.
2012
10.13089/JKIISC.2012.22.3.545
Keywords: Intrusion Detection System, Machine Learning, clustering
10.13089/JKIISC.2012.22.3.545
Keywords: Intrusion Detection System, Machine Learning, clustering
Specification-based Intrusion Detection System for WIPI
Ik-Jae Kim,
Soo-Jin Lee,
Vol. 17, No. 6, pp. 41-56,
Dec.
2007
10.13089/JKIISC.2007.17.6.41
Keywords: WIPI, Intrusion Detection System(IDS), HAL, mIDS, Mobile, Handset Device
10.13089/JKIISC.2007.17.6.41
Keywords: WIPI, Intrusion Detection System(IDS), HAL, mIDS, Mobile, Handset Device
Negative Selection Algorithm based Multi-Level Anomaly Intrusion Detection for False-Positive Reduction
Mi-Sun Kim,
Kyung-Woo Park,
Jae-Hyun Seo,
Vol. 16, No. 6, pp. 111-122,
Dec.
2006
10.13089/JKIISC.2006.16.6.111
Keywords: Intrusion Detection System, False-positive, association rule mining, Negative Selection Algorithm, Anomaly Detection
10.13089/JKIISC.2006.16.6.111
Keywords: Intrusion Detection System, False-positive, association rule mining, Negative Selection Algorithm, Anomaly Detection
A Rule Protecting Scheme with Symmetric Cryptosystem for Intrusion Detection System
Son Hyung-Seo,
Kim Hyun-Sung,
Bu Ki-Dong,
Vol. 14, No. 6, pp. 3-14,
Dec.
2004
10.13089/JKIISC.2004.14.6.3
Keywords: Intrusion Detection System, Rule Protection Mechanism, Symmetric Cryptosystem
10.13089/JKIISC.2004.14.6.3
Keywords: Intrusion Detection System, Rule Protection Mechanism, Symmetric Cryptosystem
Anomaly Detection Method Based on The False-Positive Control
,
,
,
,
Vol. 13, No. 4, pp. 151-160,
Aug.
2003
10.13089/JKIISC.2003.13.4.151
Keywords: 침입 탐지 시스템, 과탐지, 프로파일링, 연관규칙 탐사, 군집화, Intrusion Detection System, False-positive, Profiling, association rule mining, clustering
10.13089/JKIISC.2003.13.4.151
Keywords: 침입 탐지 시스템, 과탐지, 프로파일링, 연관규칙 탐사, 군집화, Intrusion Detection System, False-positive, Profiling, association rule mining, clustering
Design of Intrusion Detection System using System Call Trace of Privilege Process : Immune System Approach
,
Vol. 10, No. 1, pp. 39-52,
Feb.
2000
10.13089/JKIISC.2000.10.1.39
Keywords: computer security, Intrusion Detection System, system call, audit data, immune system
10.13089/JKIISC.2000.10.1.39
Keywords: computer security, Intrusion Detection System, system call, audit data, immune system